TRENDNET TEW651BR 150Mbps Wireless N Home Router User Manual UG TEW 651BR 1 02

TRENDNET, Inc. 150Mbps Wireless N Home Router UG TEW 651BR 1 02

Contents

UserMan-2_XU8TEW651BR

26 PPPoE  If  connected  to  the  Internet  using  a  PPPoE  (Dial-up  xDSL)  Modem,  the  ISP  will provide  a  Password  and  User  Name,  and  then  the  ISP  uses  PPPoE.  Choose  this option and enter the required information.  WAN  IP: Select  the  WAN  IP address  Obtain  from  ISP  automatically  or  enter the specified IP address. Server Name: Enter the server name provided by ISP (optional). User Name: Enter the user name provided by ISP. Password: Enter the password provided by ISP. Retype Password: Enter the password again. DNS: Enter the IP address of specified DNS server here, default value 0.0.0.0 is get the DNS settings from ISP. Auto-reconnect: Select the connection type for Always-on, Manual or Connect-on Demand connecting. Idle Time Out: Enter the idle time out for Connect on Daemon, when no Internet access during the idle time, the PPPoE connection will auto disconnect.
27 MTU: Enter the specified MTU (Maximum Transmission Unit). The default value is 1492 bytes. PPTP/L2TP with Dynamic IP If  connected  to  the  Internet  using  a  PPTP/L2TP  (Dial-up  xDSL)  with  dynamic  IP connection, enter the your Server IP, PPTP/L2TP Account and PPTP/L2TP Password, if  your  ISP  has  provided  you  with  a  DNS  IP  address,  enter  it  in  the  DNS  field, otherwise, leave it zero.     PPTP/L2TP with Static IP If  connected  to  the  Internet  using  a  PPTP/L2TP  (Dial-up  xDSL)  with  static  IP connection, enter the your IP Address, Subnet Mask, Gateway IP address, DNS IP address, Server IP address, PPTP Account and PPTP Password.
28    BigPond Cable If  your  ISP  is  Big  Pond  Cable,  the  ISP  will  provide  a  User  Name,  Password, Authentication  Server  and  Login  Server  IP  (Optional).    Choose  this  option  and enter the required information.  Password This  screen  enables  users  to  set  administrative  and  user  passwords.  These passwords are used to gain access to the WLAN Router interface.
29  Administrator:  Type  the  password  the  Administrator  will  use  to  log  into  the system.  The  password  must  be  typed  again  for  confirmation.  The  Administrator can also authorize users the ability to configure the WLAN Router. User: Type the password the User will use to log in to the system. The password must be typed again for confirmation.
30 Time This screen enables users to set the time and date for the WLAN Router's real-time clock, select properly time zone, and enable or disable daylight saving.   Local Time: Displays the local time and date. Time Zone: Select the time zone from the drop-down list. Synchronize  the  clock  with: Select the clock adjustment method form the drop-down list. Automatic: Automatically adjust the system time from NTP Server. Manual: Manually adjust the system time when you press the Set Time button. Default NTP server: The Simple Network Time Protocol (SNTP) server allows the WLAN Router to synchronize the system clock to the global Internet through the SNTP Server. Specify the NTP domain name or IP address in the text box. Set the time: Manually setting the WLAN Router system time, press the Set Time button to update the system time. Daylight  Saving:  Enables  users  to  enable  or  disable  daylight  saving  time.  When enabled, select the start and end date for daylight saving time.
31 Dynamic DNS This synchronizes the DDNS server with your current Public IP address when you are online.  First, you need to register your preferred DNS with the DDNS provider.  Then,  please  select  the  DDNS  address  in  the  Server  Address  and  fill  the  related information in the below fields: Host Name, User Name and Password.  Wireless This  section  enables  users  to  configuration  the  wireless  communications parameters for the WLAN Router. Basic This page allow user to enable and disable the wireless LAN function, create a SSID, and select the channel for wireless communications.
32 Enable/Disable: Enables or disables wireless LAN via the WLAN Router. SSID: Type an SSID in the text box. The SSID of any wireless device must match the SSID typed here in order for the wireless device to access the LAN and WAN via the WLAN Router. Channel: Select a transmission channel for wireless communications. The channel of  any  wireless  device  must  match  the  channel  selected  here  in  order  for  the wireless device to access the LAN and WAN via the WLAN Router. 802.11 Mode: Select one of the following: 2.4Ghz  802.11b/g  mixed  mode  -  Select  if  you  are  using  both  802.11b  and 802.11g wireless clients. 2.4Ghz 802.11b/g/n mixed mode - Select if you are using a mix of 802.11n, 11g, and 11b wireless clients. 2.4Ghz 802.11n only - Select if you are using 802.11n wireless clients only. Channel Width: Select the Channel Width: 20MHz – This is the default setting. Select this option if you are not using any 802.11n wireless clients. Auto 20/40 MHz - Select this option if you are using both 802.11n and non-802.11n wireless devices. SSID Broadcast: While SSID Broadcast is enabled, all wireless clients will be able to view the WLAN Router’s SSID.  WMM: Enable the Wi-Fi Multi-Media will offer Wi-Fi networks stable that improve the  user  experience  for  audio,  video,  and  voice  applications  by  prioritizing  data traffic.
33 Security   Authentication  Type:    The  authentication  type  default  is  set  to  open  system.  There are four options: Disabled, WEP, WPA, WPA2 and WPA-Auto. WEP Encryption    WPS Enabled  WPS Disabled WEP:  Open  System  and  Shared  Key  requires  the  user  to  set  a  WEP  key  to exchange data with other wireless clients that have the same WEP key. Mode: Select the key type: ASCII or HEX WEP  Key:  Select  the  level  of  encryption  from  the  drop-down  list.  The  WLAN Router supports, 64 and 128-bit encryption. Key Length  Hex  ASCII Type  characters 0-9, A-F, a-f  alphanumeric format 64-bit  10 characters  5 characters 128-bit  26 characters  13 characters
34 Key 1: Enables users to create WEP keys with WPS enabled. Manually enter a set of values for Key 1.  Key  1  ~  Key  4:  Enables  users  to  create  up  to  4  different  WEP  keys  with  WPS disabled.  Manually  enter  a  set  of  values  for  each  key.  Select  a  key  to  use  by clicking the radio button next to the key. WPA/WPA2/WPA-Auto Security with EAP  If WPA, WPA2 or WPA-Auto EAP is selected, the above screen is shown.  Please set the length of the encryption key and the parameters for the RADIUS server. Cipher Type: Select the cipher type for TKIP or AES encryption, Selected Auto for auto detects the cipher type.  RADIUS Server 1/2: 1. Enter  the  IP  address,  Port  used  and  Shared  Secret  by  the  Primary  Radius Server 1. 2. Enter the IP address, Port used and Shared Secret by the Secondary Radius Server 2. (optional) WPA/WPA2/WPA-Auto Security with PSK
35 If WPA, WPA2 or WPA-Auto PSK is selected. Cipher Type: Select the cipher type for TKIP or AES encryption, Selected Auto for auto detects the cipher type.  Passphrase: The length should be 8 characters at least.   Advanced This screen enables users to configure advanced wireless functions.   Beacon Interval: Type the beacon interval in the text box. User can specify a value from 25 to 1000. The default beacon interval is 100.  RTS  Threshold:  Type  the  RTS  (Request-To-Send)  threshold  in  the  text  box.  This value stabilizes data flow. If data flow is irregular, choose values between 256 and 2346 until data flow is normalized.  Fragmentation  Threshold:  Type  the  fragmentation  threshold  in  the  text  box.  If packet transfer error rates are high, choose values between 1500 and 2346 until packet transfer rates are minimized. (NOTE: set this fragmentation threshold value may diminish system performance.)  DTIM  Interval: Type  a  DTIM (Delivery Traffic  Indication Message)  interval  in  the text box. User can specify
36 Wi-Fi Protected Setup This screen enables users to configure the Wi-Fi Protected Setup function.  WPS: Enable or Disable the WPS (Wi-Fi Protected Setup) function Status: Display  the status  (Un-configured  State/Configured  State)  information  of WPS. Self-PIN Number: Display the current PIN number of the WLAN Router. Client PIN Number: Type Client’s PIN number the client uses to negotiate with the WLAN Router via WPS connection. It is only used when users want their station to join Router's network. Push  Button  Configuration:  Clicking  the  Start  PBC  button  will  invoke  the  Push Button  Configuration  (PBC)  method  of  WPS.  Push  the  WPS  button  on  the  client side when users want their station to join Router’s network.
37 Status This selection enables users to view the status of the WLAN Router LAN, WAN and Wireless connections, and view logs and statistics  pertaining to connections and packet transfers. Device Information This  screen  enables  users  to  view  the  WLAN  Router’s  LAN,  Wireless  and  WAN configurations.  Firmware  Version:  Displays  the  latest  build  of  the  WLAN  Router  firmware interface.  After  updating  the firmware in  Tools -  Firmware, check  this  to  ensure that the firmware was successfully updated. WAN:  This  section  displays  the  WAN  interface  configuration  including  the  MAC address, Connection status, DHCP client status, IP address, Subnet mask, Default gateway, and DNS.  Wireless:  This  section  displays  the  wireless  configuration  information,  including the MAC address, the Connection status, SSID, Channel and Authentication type. LAN:  This  section  displays  the  LAN  interface  configuration  including  the  MAC address, IP Address, Subnet Mask, and DHCP Server Status. Click “DHCP Table” to view a list of client stations currently connected to the WLAN Router LAN interface. Click  “DHCP  Release”  to  release  all  IP  addresses  assigned  to  client  stations connected to the WAN via the WLAN Router. Click “DHCP  Renew” to reassign IP addresses to client stations connected to the WAN.
38 Log This screen enables users to view a running log of Router system statistics, events, and activities. The log displays up to 200 entries. Older entries are overwritten by new entries. The Log screen commands are as follows: Click “First Page” to view the first page of the log Click “Last Page” to view the final page of the log Click “Previous Page” to view the page just before the current page Click “Next Page” to view the page just after the current page Click “Clear Log” to delete the contents of the log and begin a new log Click “Refresh” to renew log statistics   Time: Displays the time and date that the log entry was created. Message: Displays summary information about the log entry.
39 Log Setting This screen enables users to set Router Log parameters.  SMTP  Authentication:  Selected  the  Enabled  if  the  SMTP  server  need  for authentication,  fill  in  account  name  and  password  in  SMTP  Account  field  and SMTP Password field. SMTP Account: If the SMTP Authentication enabled, fill in the SMTP account name here. SMTP  Password:  If the SMTP Authentication enabled, fill in the password of the SMTP account here. SMTP Server: Type your SMTP server address here. From Email address: Type an email address for the log to be sent from. To Email address: Type an email address for the log to be sent to. Click “Email Log Now” to immediately send the current log. E-mail Logs: Email the logs to specified email receiver. When log is full - The time is not fixed. The log will be sent when the log is full, which will depend on the volume of traffic. Every day, Every Monday ...  - The log is sent on the interval specified.   If "Every day" is selected, the log is sent at the time specified.   If the day is specified, the log is sent once per week, on the specified day.
40  Select the time of day you wish the E-mail to be sent.   If  the  log  is  full  before  the  time  specified  to  send  it,  it  will  be  sent regardless. Syslog  Server:  Type  the  IP address  of  the  Syslog  Server if  user  wants  the WLAN Router to listen and receive incoming Syslog messages. Log Type: Enables users to select what items will be included in the log: System Activity: Displays information related to WLAN Router operation. Debug  Information:  Displays  information  related  to  errors  and  system malfunctions. Attacks: Displays information about any malicious activity on the network. Dropped  Packets:  Displays  information  about  packets  that  have  not  been transferred successfully. Notice: Displays important notices by the system administrator. Statistic This  screen  displays  a  table  that  shows  the  rate  of  packet  transmission  via  the WLAN Router’s LAN, Wireless and WAN ports (in bytes per second).  Click “Reset” to erase all statistics and begin logging statistics again.
41 Wireless This  screen  enables  users  to  view  information  about  wireless  devices  that  are connected to the WLAN Router.  Connected Time: Displays the time duration of wireless clients connection to the WLAN Router. MAC Address: Displays the wireless client’s MAC address.  Routing This selection enables users to set how the WLAN Router forwards data: Static and Dynamic.  Routing  Table  enables  users  to  view  the  information  created  by  the WLAN Router that displays the network interconnection topology. Static It enables users to set parameters by which the WLAN Router forwards data to its destination if the network has a static IP address.
42  Network  Address:  Type  the  static  IP  address  the  network  uses  to  access  the Internet. Contact the ISP or network administrator for this information. Network Mask: Type the network (subnet) mask of the network. If this field is left blank, the network mask defaults to 255.255.255.0.  Contact the ISP or network administrator for this information. Gateway  Address: Type the gateway address of the network. Contact the ISP or network administrator for this information. Interface: Select an interface, WAN or LAN, to connect to the Internet. Metric: Select which metric that the user wants to apply to this configuration. Add: Click to add the configuration to the static IP address table at the bottom of the page. Update: Select one of the entries in the static IP address table at the bottom of the page, and after changing parameters, click “Update” to confirm the changes. Delete: Select one of the entries in the static IP address table at the bottom of the page and click “Delete” to remove the entry. Cancel: Click the Cancel button to erase all fields and enter new information. Routing Table This  screen  enables  users  to  view  the  routing  table  of  the  WLAN  Router.  The routing table is a database created by the WLAN Router that displays the network interconnection topology.
43  Network Address: Displays the network IP address of the connected node. Network Mask: Displays the network (subnet) mask of the connected node. Gateway Address: Displays the gateway address of the connected node. Interface: Displays whether the node is connected via a WAN or LAN. Metric: Displays the metric of the connected node. Type: Displays whether the node has a static or dynamic IP address
44 Access This page enables you to define access restrictions, set up protocol and IP filters, create virtual servers, define access for special applications such as games, and set firewall rules. Filters Using filters to deny or allow the users to access to the internet.  Three types of filters can be select: MAC, Domain/URL blocking, and Protocol/IP filter.
45 MAC Filters   MAC Filter: Enables you to allow or deny accessing the internet.  Disable: Disable the MAC filter function. Allow: Only allow computers with MAC address listed in the MAC Table. Deny: Computers in the MAC Table are denied Internet access. MAC  Table:  Use  this  section  to  create  a  user  profile  which  internet  access  is denied or allowed.  The user profiles are listed in the table at the bottom of the page.    (Note:  Click  anywhere  in  the  item.  Once  the  line  is  selected,  the  fields automatically load the item's parameters, which you can edit.) Name: Type the name of the user to be permitted/denied access. MAC Address: Type the MAC address of the user's network interface. Add: Click to add the user to the list at the bottom of the page. Update: Click to update information for the user, if you have changed  any of the fields. Delete: Select a user from the table at the bottom of the list and click Delete to remove the user profile. Cancel: Click Cancel to erase all fields and enter new information.
46 Domain/URL Blocking You could specify the domains that allow users to access or deny by clicking one of the two items.  Also, add the specified domains in the text box.   Disable: Disable the Domain/URL Blocking function.  Allow: Allow users to access all domains except “Domains List”.  Deny: Deny users to access all domains except “Domains List”.  Domains List: List Domain/URL you will Denied or Allowed.  Delete:  Select  a  Domain/URL  from  the  table  at  the  bottom  of  the  list  and click Delete to remove the Domain/URL.  Add: Click to Add button to add domain to the Domains list.  Cancel: Click the Cancel button to erase all fields and enter new information.
47 Protocol/IP Filters This  screen  enables  you  to  define  a  minimum  and  maximum  IP  address  range filter; all IP addresses falling within the range are not allowed accessing internet.  The IP filter profiles are listed in the table at the bottom of the page. (Note: Click anywhere in the item. Once the line is selected, the fields automatically load the item's parameters, which you can edit.)  Enable: Click to enable or disable the IP address filter. Name: Type the name of the user to be denied access. Protocol: Select a protocol (TCP or UDP) to use for the virtual server. Port: Type the port range of the protocol. IP  Range:  Type  the  IP  range.  IP  addresses  falling  between  this  value  and  the Range End are not allowed to access the Internet.  Add: Click to add the IP range to the table at the bottom of the screen.  Update: Click to update information for the range if you have selected a list item and have made changes.  Delete: Select a list item and click Delete to remove the item from the list.
48  Cancel: Click the Cancel button to erase all fields and enter new information. Virtual Server This  screen  enables  user  to  create  a  virtual  server  via  the  WLAN  Router.  If  the WLAN  Router  is  set  as  a  virtual  server,  remote  users  requesting  Web  or  FTP services  through  the  WAN  are  directed  to  local  servers  in  the  LAN.  The  WLAN Router redirects the request via the protocol and port numbers to the correct LAN server. The Virtual Sever profiles are listed in the table at the bottom of the page. Note: When selecting items in the table at the bottom, click anywhere in the item. The line is selected, and the fields automatically load the item's parameters, which user can edit.  Enable: Click to enable or disable the virtual server. Name: Type a descriptive name for the virtual server. Protocol: Select a protocol (TCP or UDP) to use for the virtual server. Private Port: Type the port number of the computer on the LAN that is being used to act as a virtual server. Public Port: Type the port number on the WAN that will be used to provide access to the virtual server. LAN Server: Type the LAN IP address that will be assigned to the virtual server.  Add: Click to add the virtual server to the table at the bottom of the screen.
49  Update:  Click  to  update  information  for  the  virtual  server  if  the  user  has selected a listed item and has made changes.  Delete: Select a listed item and click Delete to remove the item from the list.  Cancel: Click Cancel button to erase all fields and enter new information. Special AP This  screen  enables  users  to  specify  special  applications,  such  as  games  which require  multiple  connections  that  are  blocked  by  NAT.  The  special  applications profiles are listed in the table at the bottom of the page. Note: When selecting items in the table at the bottom, click anywhere in the item. The line is selected, and the fields automatically load the item's parameters, which user can edit.  Enable: Click to enable or disable the application profile. When enabled, users will be  able  to  connect  to  the  application  via  the  WLAN  Router’s  WAN  connection. Click “Disabled” on a profile to prevent users from accessing the application on the WAN connection. Name: Type a descriptive name for the application. Trigger:  Defines  the  outgoing  communication  that  determines  whether  the  user has legitimate access to the application.  Protocol: Select the protocol (TCP, UDP, or * for TCP+UDP) that can be used to access the application.  Port Range: Type the port range that can be used to access the application in the text boxes.
50 Incoming:  Defines  which  incoming  communications  users  are  permitted  to connect with.  Protocol: Select the protocol (TCP, UDP, or * for TCP+UDP) that can be used by the incoming communication.  Port:  Type  the  port  number  that  can  be  used  for  the  incoming communication.  Add: Click to add the special application profile to the table at the bottom of the screen.  Update: Click to update information for the special application if user have selected a list item and have made changes.  Delete: Select a list item and click Delete to remove the item from the list.  Cancel: Click Cancel button to erase all fields and enter new information.  DMZ This screen enables users to create a DMZ for those computers that cannot access Internet applications properly through the WLAN Router and associated security settings.  Note: Any clients added to the DMZ exposes the clients to security risks such as viruses and unauthorized access.  Enable: Click to enable or disable the DMZ. DMZ  Host  IP:  Type  a  host  IP  address  for  the  DMZ.  The  computer  with  this  IP address acts as a DMZ host with unlimited Internet access. Apply: Click to save the settings.
51 Firewall Settings This screen enables users to set up the firewall. The WLAN Router provides basic firewall functions, by filtering all the packets that enter the WLAN Router using a set of rules. The rules are listed in sequential order--the lower the rule number, the higher the priority the rule has.  Enable: Click to enable or disable the firewall rule profile. Name: Type a descriptive name for the firewall rule profile. Action: Select whether to allow or deny packets that conform to the rule. Source: Defines the source of the incoming packet that the rule is applied to. ●  Interface: Select which interface (WAN or LAN) the rule is applied to. ●  IP Range Start: Type the start IP address that the rule is applied to. ●  IP Range End: Type the end IP address that the rule is applied to. Destination:  Defines  the  destination  of  the  incoming  packet  that  the  rule  is applied to. ●  Interface: Select which interface (WAN or LAN) the rule is applied to. ●  IP Range Start: Type the start IP address that the rule is applied to. ●  IP Range End: Type the end IP address that the rule is applied to. ●  Protocol: Select the protocol (TCP, UDP, or ICMP) of the destination. ●  Port Range: Select the port range. Add: Click to add the rule profile to the table at the bottom of the screen. Update: Click to update information for the rule if the user has selected a listed item and has made changes.
52 Delete: Select a listed item and click Delete button to remove the entry from the list. New: Click “New” to erase all fields and enter new information. Priority  Up:  Select  a  rule  from  the  list  and  click  “Priority  Up”  to  increase  the priority of the rule. Priority Down: Select a rule from the list and click “Priority Down” to decrease the priority of the rule. Update Priority: After increasing or decreasing the priority of a rule, click “Update Priority” to save the changes. Management Management enables users to set up the Remote Management feature. Remote Management This  screen  enables  users  to  set  up  remote  management.  Using  remote management,  the  WLAN  Router  can  be  configured  through  the  WAN  via a  Web browser. A user name and password are required to perform remote management.  HTTP:  Enables  users  to  set  up  HTTP  access  of  the  Port  number,  and  Remote  IP Range for remote management. Allow to Ping WAN Port: Type a range of Router IP addresses that can be pinged from remote locations UPnP  Enable:  UPnP  is  short  for  Universal  Plug  and  Play  that  is  a  networking architecture that provides compatibility among networking equipment, software, and peripherals. The WLAN Router is an UPnP-enabled Router and will only work with  other  UPnP  devices/software.  If  user  does  not  want  to  use  the  UPnP functionality, select “Disabled” to disable it.
53 PPTP: Enables users to set up PPTP access for remote management. L2TP: Enables users to set up L2TP access for remote management. IPSec: Enables users to set up IPSec access for remote management.
54 Tools This page enables users to restart the system, save and load different settings as profiles,  restore  factory  default  settings,  run  a  setup  wizard  to  configure  WLAN Router settings, upgrade the firmware, and ping remote IP addresses. Restart Click  “Restart”  to  restart  the  system  in  the  event  the  system  is  not  performing correctly.  Settings This  screen  enables  users  to  save  settings  as  a  profile  and  load  profiles  for different circumstances. User can also load the factory default settings, and run a setup wizard to configure the WLAN Router and Router interface.  Save Settings: Click “Save” to save the current configuration as a profile that can load when necessary.
55 Load Settings: Click “Browse” and go to the location of a stored profile. Click “Load” to load the profile's settings. Restore Factory Default Settings: Click “Restore” to restore the default settings. All configuration changes will lose. Firmware This screen enables users to keep the WLAN Router firmware up to date.  Please follow the below instructions: Download the latest firmware from the manufacturer's Web site, and save it to disk. Click “Browse” and go to the location of the downloaded firmware file. Select the file and click “Upgrade” to update the firmware to the latest release.
56 Ping Test The ping test enables users to determine whether an IP address or host is present on the Internet. Type the host name or IP address in the text box and click Ping.
57 TECHNICAL SPECIFICATIONS Hardware Standards  Wired: IEEE 802.3 (10Base-T), IEEE 802.3u (100Base-TX) Wireless: IEEE 802.11b, IEEE 802.11g, IEEE 802.11n , IEEE 802.11e QoS WAN  1 x 10/100Mbps Auto-MDIX port (Internet) LAN   4 x 10/100Mbps Auto-MDIX ports WPS Button  Enables Wi-Fi Protected Setup (WPS) function Connection Type  Dynamic IP, Static (Fixed) IP, PPPoE, PPTP, L2TP, Big Pond UPnP  UPnP IGD 1.0 compliant DMZ  DMZ host & Virtual Servers DNS  Static or WAN assigned DNS servers; 3 verified services for DDNS Internet Access Control  MAC Address Filter, Domain/URL Filter, Protocol/IP Filter Logging  5 types of event logging; email report  LED Indicator  Power, LAN1~LAN4, WAN, WLAN, Status Power Adapter  5V DC, 1.2A external power adapter Power Consumption  3.5watts (max) Dimension (L x W x H)  150 x 110 x 30mm (5.9 x 4.3 x 1.2in) Weight   225g (7.8oz) Temperature  Operation: 0°~ 40°C (32°F~ 104°F); Storage: -10°~ 70°C (14°F~158 °F) Humidity  Max. 90% (non-condensing) Certifications  CE, FCC Wireless Frequency  2.412~2.484GHz band Antenna  1 x 2dBi fixed dipole antennas Media Access Protocol  CSMA/CA with ACK Data Rate 802.11b: up to 11Mbps 802.11g: up to 54Mbps 802.11n: up to 150Mbps Security  WEP(HEX/ASCII): 64/128-bit  WPA(AES/TKIP): WPA/WPA2-Radius, WPA-PSK/WPA2-PSK  Output Power  25 dBm Receiving Sensitivity  802.11b: -85dBm (typical) @ 11Mpbs 802.11g: -68dBm (typical) @ 54Mbps 802.11n: -62dBm (typical) @ 150Mbps Channels  1~ 11 (FCC), 1~13 (ETSI)
58 LIMITED WARRANTY  TRENDnet  warrants  its  products  against  defects  in  material  and  workmanship,  under  normal  use  and  service,  for  the  following lengths of time from the date of purchase.              TEW-651BR – 3 Years Warranty AC/DC Power Adapter, Cooling Fan, and Power Supply carry 1 year warranty.  If a product does not operate as warranted during the applicable warranty period, TRENDnet shall reserve the right, at its expense, to repair or replace the defective product or part and deliver an equivalent product or part to the customer. The repair/replacement unit’s  warranty  continues  from  the  original  date  of  purchase.  All  products  that  are  replaced become  the property of  TRENDnet. Replacement  products  may  be  new  or  reconditioned.  TRENDnet  does  not  issue  refunds  or  credit.  Please  contact  the  point-of-purchase for their return policies.  TRENDnet shall not be responsible for any software, firmware, information, or memory data of customer contained in, stored on, or integrated with any products returned to TRENDnet pursuant to any warranty.  There are  no  user  serviceable  parts  inside  the  product.    Do  not  remove  or  attempt  to  service  the  product  by  any  unauthorized service center.  This warranty is voided if (i) the product has been modified or repaired by any unauthorized service center, (ii) the product was subject to accident, abuse, or improper use (iii) the product was subject to conditions more severe than those specified in the manual.  Warranty service may be obtained by contacting TRENDnet within the applicable warranty period and providing a copy of the dated proof of the purchase. Upon proper submission of required documentation a Return Material Authorization (RMA) number will be issued. An RMA number is required in order to initiate warranty service support for all TRENDnet products. Products that are sent to TRENDnet for RMA service must have the RMA number marked on the outside of return packages and sent to TRENDnet prepaid, insured and packaged appropriately for safe shipment. Customers shipping from outside of the USA and Canada are responsible for return shipping fees. Customers shipping from outside of the USA are responsible for custom charges, including but not limited to, duty, tax, and other fees.  WARRANTIES  EXCLUSIVE:  IF  THE  TRENDNET  PRODUCT  DOES  NOT  OPERATE  AS  WARRANTED  ABOVE,  THE  CUSTOMER’S  SOLE REMEDY SHALL BE, AT TRENDNET’S OPTION, REPAIR OR  REPLACE. THE  FOREGOING WARRANTIES AND  REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ALL OTHER WARRANTIES, EXPRESSED OR IMPLIED, EITHER IN FACT OR BY OPERATION OF LAW, STATUTORY OR OTHERWISE,  INCLUDING  WARRANTIES  OF  MERCHANTABILITY  AND  FITNESS  FOR  A  PARTICULAR  PURPOSE.  TRENDNET  NEITHER ASSUMES  NOR  AUTHORIZES  ANY  OTHER  PERSON  TO  ASSUME  FOR  IT  ANY  OTHER  LIABILITY  IN  CONNECTION  WITH  THE  SALE, INSTALLATION MAINTENANCE OR USE OF TRENDNET’S PRODUCTS.  TRENDNET SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING AND EXAMINATION DISCLOSE THAT THE ALLEGED DEFECT IN  THE  PRODUCT  DOES  NOT  EXIST  OR  WAS  CAUSED  BY  CUSTOMER’S  OR  ANY  THIRD  PERSON’S  MISUSE,  NEGLECT,  IMPROPER INSTALLATION OR TESTING, UNAUTHORIZED ATTEMPTS TO REPAIR OR MODIFY, OR ANY OTHER CAUSE BEYOND THE RANGE OF THE INTENDED USE, OR BY ACCIDENT, FIRE, LIGHTNING, OR OTHER HAZARD.  LIMITATION OF LIABILITY: TO THE FULL EXTENT ALLOWED BY LAW TRENDNET ALSO EXCLUDES FOR ITSELF AND ITS SUPPLIERS ANY LIABILITY,  WHETHER  BASED  IN  CONTRACT  OR  TORT  (INCLUDING  NEGLIGENCE),  FOR  INCIDENTAL,  CONSEQUENTIAL,  INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE OR PROFITS, LOSS OF BUSINESS, LOSS OF INFORMATION OR DATE, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE,  FAILURE,  OR  INTERRUPTION  OF  THE  POSSIBILITY  OF  SUCH  DAMAGES,  AND  LIMITS  ITS  LIABILITY  TO  REPAIR, REPLACEMENT, OR REFUND OF THE PURCHASE PRICE PAID, AT TRENDNET’S OPTION. THIS DISCLAIMER OF LIABILITY FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREIN SHALL FAIL OF ITS ESSENTIAL PURPOSE.  Governing Law: This Limited Warranty shall be governed by the laws of the state of California.
59 Some TRENDnet  products  include  software  code written  by third party  developers. These codes are subject  to the GNU  General Public License ("GPL") or GNU Lesser General Public License ("LGPL").   Go to http://www.trendnet.com/gpl or http://www.trendnet.com Download section and look for the desired TRENDnet product to access to the GPL Code or LGPL Code. These codes are distributed WITHOUT WARRANTY and are subject to the copyrights of the developers.  TRENDnet  does  not  provide  technical  support  for  these  codes.  Please  go  to  http://www.gnu.org/licenses/gpl.txt  or http://www.gnu.org/licenses/lgpl.txt for specific terms of each license. PWP05202009v2
60

Navigation menu